pangaeatech / tinymce-paste-from-word-plugin

TinyMCE 6.x Plugin to add support for pasting from Microsoft Word documents
GNU Lesser General Public License v2.1
8 stars 2 forks source link

tinymce-6.8.2.tgz: 2 vulnerabilities (highest severity is: 6.1) #145

Closed mend-bolt-for-github[bot] closed 1 month ago

mend-bolt-for-github[bot] commented 3 months ago
Vulnerable Library - tinymce-6.8.2.tgz

Library home page: https://registry.npmjs.org/tinymce/-/tinymce-6.8.2.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/tinymce/package.json

Found in HEAD commit: 592b6f6461d2b9b012655aaf953565bdca0aa02e

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (tinymce version) Remediation Possible**
CVE-2024-38357 Medium 6.1 tinymce-6.8.2.tgz Direct 6.8.4
CVE-2024-38356 Medium 6.1 tinymce-6.8.2.tgz Direct 6.8.4

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-38357 ### Vulnerable Library - tinymce-6.8.2.tgz

Library home page: https://registry.npmjs.org/tinymce/-/tinymce-6.8.2.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/tinymce/package.json

Dependency Hierarchy: - :x: **tinymce-6.8.2.tgz** (Vulnerable Library)

Found in HEAD commit: 592b6f6461d2b9b012655aaf953565bdca0aa02e

Found in base branch: main

### Vulnerability Details

TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content parsing code. This allowed specially crafted noscript elements containing malicious code to be executed when that content was loaded into the editor. This vulnerability has been patched in TinyMCE 7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by ensuring that content within noscript elements are properly parsed. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Publish Date: 2024-06-19

URL: CVE-2024-38357

### CVSS 3 Score Details (6.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2024-38357

Release Date: 2024-06-19

Fix Resolution: 6.8.4

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
CVE-2024-38356 ### Vulnerable Library - tinymce-6.8.2.tgz

Library home page: https://registry.npmjs.org/tinymce/-/tinymce-6.8.2.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/tinymce/package.json

Dependency Hierarchy: - :x: **tinymce-6.8.2.tgz** (Vulnerable Library)

Found in HEAD commit: 592b6f6461d2b9b012655aaf953565bdca0aa02e

Found in base branch: main

### Vulnerability Details

TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content extraction code. When using the `noneditable_regexp` option, specially crafted HTML attributes containing malicious code were able to be executed when content was extracted from the editor. This vulnerability has been patched in TinyMCE 7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by ensuring that, when using the `noneditable_regexp` option, any content within an attribute is properly verified to match the configured regular expression before being added. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Publish Date: 2024-06-19

URL: CVE-2024-38356

### CVSS 3 Score Details (6.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2024-38357

Release Date: 2024-06-19

Fix Resolution: 6.8.4

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
mwaddell commented 1 month ago

Will be addressed by PR #100